[WEBINAR] Bulletproof: How Today's Business Leaders Stay on Top

Internal Attack

Definition - What does Internal Attack mean?

An internal attack occurs when an individual or a group within an organization seeks to disrupt operations or exploit organizational assets. In many cases, the attacker employs a significant amount of resources, tools and skill to launch a sophisticated computer attack and potentially remove any evidence of that attack as well.

Highly-skilled and disgruntled employees (such as system administrators and programmers) or technical users who could benefit from disrupting operations may choose to initiate an internal attack against a company through its computer systems.

Techopedia explains Internal Attack

One of the best ways to protect against internal attacks is to implement an intrusion detection system and to configure it to scan for both external and internal attacks. All forms of attacks should be logged, and the logs should be reviewed regularly.

Most of the security measures should be logically connected to the network perimeter, which protects the internal networks from external connections such as the Internet. While the perimeter of the network is secured, the inside or trusted portion of the network tends to be soft. Once an intruder has made it through the hard outer shell of the network, compromising one system after another is usually simple.

Following some simple security principles - such as segregating duties and access levels among employees - will go a long way toward providing overall security for company assets.

Share this:

Connect with us

Email Newsletter

Join thousands of others with our weekly newsletter

The 4th Era of IT Infrastructure: Superconverged Systems
The 4th Era of IT Infrastructure: Superconverged Systems:
Learn the benefits and limitations of the 3 generations of IT infrastructure – siloed, converged and hyperconverged – and discover how the 4th...
Approaches and Benefits of Network Virtualization
Approaches and Benefits of Network Virtualization:
Businesses today aspire to achieve a software-defined datacenter (SDDC) to enhance business agility and reduce operational complexity. However, the...
Free E-Book: Public Cloud Guide
Free E-Book: Public Cloud Guide:
This white paper is for leaders of Operations, Engineering, or Infrastructure teams who are creating or executing an IT roadmap.
Free Tool: Virtual Health Monitor
Free Tool: Virtual Health Monitor:
Virtual Health Monitor is a free virtualization monitoring and reporting tool for VMware, Hyper-V, RHEV, and XenServer environments.
Free 30 Day Trial – Turbonomic
Free 30 Day Trial – Turbonomic:
Turbonomic delivers an autonomic platform where virtual and cloud environments self-manage in real-time to assure application performance.